If you cannot view this email please click here



Hacking Cloud Compliance Reviews


Security camera hacked to 'watch the watchers'

A Motorola Focus 73 outdoor security camera has been hacked by researchers, who gained access to the home network's Wi-Fi password

main headline

Silent cyber attacks strike Scotland

Scotland has been hit by a wave of silent cyber attacks - with individuals and businesses robbed of private information from their mobile devices

main headline

Making AppSense of endpoints

AppSense's success in delivering endpoint security solutions is the topic of a new report, 'Knocking Some (App)Sense into Endpoint Security'

Fortifying security in Edinburgh

Edinburgh Castle, once the site of countless bloody battles, recently became the location for discussing the war against cybercrime

‘DROWN’ threatens to engulf vulnerable servers

New OpenSSL vulnerability 'DROWN', affecting servers using SSLv2, can decrypt secure HTTPS communications, including passwords and credit card numbers

main headline

Criminalising reckless disclosure

A call has gone out urging that, where someone’s actions result in ‘reckless disclosure’, this should be made a criminal offence

Heart of darkness for the enterprise

Darktrace has extended its self-learning threat detection to third-party cloud environments


Upping the ante with anti-malware

Combatting malware means going way beyond locating suspicious programs on servers and workstations, and detecting and interfering with the use of malware on the network

main headline

The human factor

The barriers that keep any organisation safe from attack are often guarded by nothing more than a single factor of authentication.

main headline

Young… ethical… female… and a hacker

A female student is set to play a key role in Scotland's growing battle against cybercrime

main headline

Passwords: the cracks are still showing

Passwords such as '123456’ and 'qwerty' are still widely used. Why are we so reckless with our security?

main headline

A safer harbour?

The European Commission has announced a new EU-US Privacy Shield to replace Safe Harbour as a framework for transatlantic data flows

main headline


The Gold Rush is On!

With the strongest defence against cyber attacks being a skilled and experienced cybersecurity team, lucrative careers are beckoning

main headline

Product Review

Malwarebytes Breach Remediation

According to many different statistics, most exploit attacks happen against known vulnerabilities

main headline



More of our winners from the 2015 Computing Security Awards:

Mobile Security Solution of the Year

WINNER: Good Technology - Good Work
RUNNER UP: Accellion – Kiteworks

main headline

Identity and Access Management Solution of the Year

WINNER: ForgeRock - Open AM
RUNNER UP: Wallix - AdminBastion

main headline

Auditing / Reporting Solution of the Year

WINNER: Fortinet - FortiAnalyzer
RUNNER UP: Assuria – CyberSense

All of the 2015 Awards results can be seen by going to:


Please note: the winning products and services will not necessarily be the only solutions or the newest solutions available from the respective suppliers. You should contact these suppliers directly to learn more about what they can offer.

main headline

White papers

How to avoid a tangled Web

Web 2.0 aids enterprises in conducting business, but also introduces many damaging risks. Trend Micro offers its insights into Web application vulnerabilities and how to avoid these

Meeting European Data Protection and Security Requirements with CipherCloud Solutions

This white paper investigates how encryption and tokenisation of data can help companies that are subject both to EU data protection and general security laws to adopt cloud-based solutions and remain in legal compliance

Welcome to the March 2016 issue of the Computing Security Newsletter

This year is shaping up to be the biggest yet for ransomware in the enterprise after the latest Trend Micro intelligence found infections among UK firms in February 2016 alone far exceeded the figures for the first six months of last year.

The stats speak for themselves: there were more than twice as many infections last month than in the entire first three months of 2015. If you add January and February’s tally together, it comes to more than triple the infection count for Q1 2015.

Ransomware has become a favourite way for cybercriminals to extort money out of businesses, with variants such as CyrptoWall and CryptoLocker causing havoc, disruption and significant monetary losses for their corporate victims.

So-called ‘crypto-ransomware’ is now by far the most common type – accounting for 100% of UK enterprise infections in February and just 1% in January, according to Trend Micro.
It can be spread via malicious adverts, email attachments, web links or even booby-trapped smartphone apps.

If the victim's machine or device is unprotected, the malware will encrypt their files and demand a fee in Bitcoin or similar within a certain timeframe to provide the decryption key. Failure to do so will result in the loss of those files forever.

How soon biometrics might become mainstream across all business sectors is now the big question, especially as cyber attacks continue to hit unprecedented levels.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :




To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622